Consumer Driven IT in Review – 14th edition

$1B is the astonishing amount Facebook is paying for Instagram, making Kevin Systrom a multi-millionaire (full disclosure: my daughter was classmates with Kevin and graduated with him from The Middlesex School – she commented that all her classmates can now relax because the race for the “most successful” in her class is officially over!).

$1B is the astonishing amount Facebook is paying for Instagram, making Kevin Systrom a multi-millionaire (full disclosure: my daughter was classmates with Kevin and graduated with him from The Middlesex School – she commented that all her classmates can now relax because the race for the “most successful” in her class is officially over!). What I found most fascinating is the instant backlash from loyal users about Instagram becoming part of the “evil empire”, i.e. Facebook. In fact, many Instagram users of my daughter’s age have long since abandoned Facebook as a photo-sharing site or even as their social network of choice, leaving it to us aging Baby Boomers. McCracken-IMG_1015-300


This must be pretty sobering to IT. While many IT departments are still wrestling with putting together policies for employees’ use of Facebook at work, employees have already moved on to the next cool thing. How can IT possibly keep up?  In many ways it can’t. Consumerization not only marches on, it has hopped a speeding bullet train. IT would be wise to focus more on ways to evolve their organization and infrastructure to adapt with speed and agility and worry less about what the technology-du-jour happens to be.  For instance, using a knowledge-based security approach with strong yet flexible authentication will enable IT to move from the era of “no” to “know” regardless of the particular device or app.


Here’s what else was in the IT consumerization news in the last two weeks:


April 1982% of data breeches are due to staff errors by Kevin Fogarty via IT World
Information from latest survey from PwC; another Sophos survey show very low trust by IT in their users.


April 17: Paying with smartphones to outpace credit cards by 2020 by Cameron Scott via ITWorld
The race is on, so says Pew Research’s survey of technology experts.


April 16Consumerization and the nagging IT expectations gap by Matthew Brown of Forrester
Great post looking back at earlier predictions and what it all means for IT.


April 15The post-PC Enterprise by Aaron Levie via TechCrunch
CEO of Box positions Apple’s strategy as the ultimate implementation of Larry Ellison’s original network computer (NC)


April 14:  Is Facebook making us lonely? by Stephen Marche via Atlantic Monthly
Research shows that heavy users of Facebook actually tend to be more lonely.


April 13 The fallacy of business social networking by Galen Gruman via Infoworld
It is not surprising employees resist using tools they don’t need.


BYOD and mobile cloud apps lead to licensing compliance issues by Bridget Botelho via SearchEnterpriseDesktop
IT is using old methodologies to track new ways of app delivery, and it can cause compliance issues.


The value of social business: exploring the ROI question by Dion Hinchcliffe via Dachis
A practical approach to evaluating ROI in a very early maturity advancement.


April 10:  Does your cloud storage provider hold the keys to your data? by Patrick Lambert via TechRepublic
Time-proven best practices for protecting your data should not be forgotten in the cloud.


Social customer service: don’t compete against machines by David Gutelius via Forbes
Social customer service is using social business technology to transform customer care, and pairs the best aspects of humans and technology, while transcending the limitations of both.


April 9: The CIO enters the era of disruption by Thornton May via CIO
New C-level positions are being created to perform tasks perceived as not being adequately addressed by incumbent CIOs and CMOs


NEW from CA Technologies This Week:
• Latest Chief and Chuck “It’s Tax Time” cartoon has a little fun with the IRS!   http://bit.ly/IlGzHx
• Sumner Blount explores the implications from the latest poll on ca.com:  Cloud security is still the biggest concern

Written by

Jackie Kahle

Jackie is a 30-year veteran of the IT industry, holding senior management positions in marketing,…

Published in

Security

View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!

  • http://www.sheistocktips.com/ SHRISTOCKTIPS

    SHRISTOCKTIPS has
    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website. http://goo.gl/sMgZ7n

    Regards

    SHRISTOCKTIPS TEAM

  • king lear

    testing comment functionality, please do not publish this

  • http://www.rachelmacik.com Rachel Macik

    Love the personal pic :)

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • http://www.linkedin.com/in/michelehudnall Michele Hudnall

    While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again :-) – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.
    https://www.netiq.com/communities/data-center-solutions/accelerating_business_overhauling_service_management/

    Nice Post and Timely!

    @HudnallsHuddle

    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.